0% found this document useful (0 votes)
2 views

rushi

The document discusses cyber crime, defining it as illegal activities conducted via computer networks, and outlines its history, categories, and types. It highlights the rise of cyber crime alongside the growth of the internet in India and emphasizes the need for prevention measures. The conclusion calls for law enforcement agencies to establish rules for addressing various forms of cyber crime.

Uploaded by

mchaudharimr500
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

rushi

The document discusses cyber crime, defining it as illegal activities conducted via computer networks, and outlines its history, categories, and types. It highlights the rise of cyber crime alongside the growth of the internet in India and emphasizes the need for prevention measures. The conclusion calls for law enforcement agencies to establish rules for addressing various forms of cyber crime.

Uploaded by

mchaudharimr500
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Cyber Crime

Submitted to: Submitted


By:
HOD
Rushikesh Bhujbal
Content
Introduction
What is Cyber Crime
History of cyber crime
Categories of cyber crime
Types of cyber crime
Cyber criminals
Prevention
Conclusion
Introduction
 The internet in India is growing
rapidly. It has given rise to new
opportunities in every field we can
think of ? be it entertainment,
business, sports or education.
 There are two sides to a coin.
Internet also has its own
disadvantages. One of the major
disadvantages is Cyber crime ?
illegal activity committed on the
internet.
What is Cybercrime
 Cybercrime is any illegal act committed using a
computer network (especially the Internet).
 Cybercrime is a subset of computer crime.
History
 The first recorded cyber crime took place in the year
1820!
 In 1820, Joseph-Marie Jacquard, a textile manufacturer
in France, produced the loom. This device allowed the
repetition of a series of steps in the weaving of special
fabrics.
 This resulted in a fear amongst Jacquard‘s employees
that their traditional employment and livelihood were
being threatened.
 They committed acts of sabotage to discourage Jacquard
from further use of the new technology. This is the first
recorded cyber crime!
Types of Cyber Crime

 Hacking
 Denial OF Service Attack
 Virus Dissemination
 Computer Forgery
 Credit Card Fraud
 Phishing
 Spoofing
 Cyber Stalking
 Threatening
 Salami attack
Modification of a conventional
crime by using computers.
 Financial crimes
 Cyber pornography
 Sale of illegal articles
 Online gambling
 Intellectual Property crime
 Email spoofing
 Forgery
 Cyber Defamation
 Cyber stalking
Categories Cyber crimes
Cyber crimes can be basically divided into 3
major categories:

1. Cyber crimes against persons.

2. Cyber crimes against property.

3. Cyber crimes against government


First Category

Cyber harassment is a distinct Cybercrime.


Various kinds of harassment can and do occur in
cyberspace, or through the use of cyberspace.
Harassment can be sexual, racial, religious, or
other.
Second Category
These crimes include computer
vandalism(destruction of others' property),
transmission of harmful programs, unauthorized
trespassing through cyber space, unauthorized
possession of computer information.
Third Category
Cyber terrorism is one distinct kind of crime in
this category.
The growth of internet has shown that the
medium of Cyberspace is being used by
individuals and groups to threaten the
international governments as also to terrorize the
citizens of a country.
Cyber Criminals
 Kids (age group 9-16 etc.)
 Organized hacktivists
 Disgruntled employees
 Professional hackers (corporate espionage)
PREVENTION OF CYBER CRIME
 Avoid disclosing your identity to any strangers.
 Always use latest antivirus software to guard against
virus attacks.
 Never send your credit card number to any site which
is not secured.
 Use of firewall
 Change passwords frequently
 Uninstall unnecessary software
Conclusion
Within the law enforcement agencies, a set of
rules must be developed to address the various
categories of computer crime.
As such, investigators will know what and
which materials to search and seize, the
electronic evidence to recover, and the chain of
custody to maintain .
Reference
www.google.com
www.wikipedia.com
www.studymafia.org
Thanks

You might also like